Which tools should you use?
You need to ensure that only the members of the Power Users group and the members of the Administrators group can view the events in the System log.
Which tools should you use?
You need to view the most recent user accounts authenticated by RODC1
Your network contains an Active Directory domain named contoso.com.
Contoso.com contains a domain controller named DC1 and a read-only domain controller (RODC) named RODC1.
You need to view the most recent user accounts authenticated by RODC1.
What should you do first?
You need to ensure that the DNS server resolves queries for isatap
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1.
You are configuring DirectAccess.
You create a static host (A) record for isatap.contoso.com.
You discover that the DNS server fails to respond to queries for the isatap.contoso.com record.
You need to ensure that the DNS server resolves queries for isatap.contoso.com.
What should you do?
You need to monitor the following information on the domain controllers during the next five days:
Your network contains an Active Directory domain. The domain contains 10 domain controllers that run Windows Server 2008 R2.
You need to monitor the following information on the domain controllers during the next five days:
* Memory usage
* Processor usage
* The number of LDAP queries
What should you do?
Which tool should you use? (Each correct answer presents a complete solution
Your network contains two Active Directory forests named contoso.com and fabrikam.com. Fabrikam.com contains a server named Server1 that has the Print and Document Services server role installed.
Server1 contains 50 shared printers.
You join Server1 to the contoso.com domain.
You need to ensure that all of the shared printers on Server1 are listed in the contoso.com forest.
Which tool should you use? (Each correct answer presents a complete solution. Choose two.)
How should you modify the command?
Your network contains a domain controller that runs Windows Server 2008 R2.
You run the following command on the domain controller:
dsamain.exe C dbpath c:\$SNAP_201006170326_VOLUMEC$\Windows\NTDS\ntds.dit C ldapport 389 – allowNonAdminAccess
The command fails. You need to ensure that the command completes successfully.
How should you modify the command?
What should you configure in File Server Resource Manager? (Each correct answer presents part of the solution
You manage a server named Serverl that runs Windows Server 2008 R2 Service Pack 1 (SP1). Serverl has the File Services server role installed.
You have a file share named Share 1.
You need to ensure that any Microsoft Word files saved to Share1 that contain the word “confidential” are moved automatically to a folder named Confidential.
What should you configure in File Server Resource Manager? (Each correct answer presents part of the solution. Choose three.)
You need to ensure that the DNS records are deleted automatically from the zone
Your network contains an Active Directory-integrated DNS zone named contoso.com. You discover that the zone includes DNS records for computers that were removed from the network. You need to ensure that the DNS records are deleted automatically from the zone. What should you do?
Which tool should you use?
Your network contains an Active Directory forest named contoso.com. The forest contains a server named Server1 that runs Windows Server 2008 R2 Service Pack 1 (SP1) Standard. The forest contains a server named Server2 that runs Windows Server 2008 R2 SP1 Enterprise. Server1 and Server2 have the Print and Document Services server role installed.
You need to migrate the print queues, printer settings, printer ports, and language monitors from Server1 to Server2.
Which tool should you use?
You need to ensure that the encryption keys for e-mail certificates can be recovered from the CA database
Your network contains a single Active Directory domain. The domain contains an enterprise certification authority (CA).
You need to ensure that the encryption keys for e-mail certificates can be recovered from the CA database.
You modify the e-mail certificate template to support key archival.
What should you do next?